=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/crypto.html,v retrieving revision 1.86 retrieving revision 1.87 diff -c -r1.86 -r1.87 *** www/crypto.html 2001/06/26 11:46:14 1.86 --- www/crypto.html 2001/06/27 11:51:21 1.87 *************** *** 79,89 **** ! OpenBSD was the first operating system to ship with an IPSEC stack. ! We've been including IPSEC since early OpenBSD 2.1 release in 1997. ! Our fully conformant in-kernel IPSEC stack, with hardware acceleration based on a number of cards, and our own free ISAKMP daemon, is used as ! one of the machines in the IPSEC conformance testbed run by VPNC.

--- 79,89 ---- ! OpenBSD was the first operating system to ship with an IPsec stack. ! We've been including IPsec since early OpenBSD 2.1 release in 1997. ! Our fully conformant in-kernel IPsec stack, with hardware acceleration based on a number of cards, and our own free ISAKMP daemon, is used as ! one of the machines in the IPsec conformance testbed run by VPNC.

*************** *** 189,195 ****

  • Stronger temporary names for mktemp(3) and mkstemp(3)
  • Randomness added to the TCP ISS value for protection against spoofing attacks. !
  • random padding in IPSEC esp_old packets.
  • To generate salts for the various password algorithms.
  • For generating fake S/Key challenges.
  • In photurisd --- 189,195 ----
  • Stronger temporary names for mktemp(3) and mkstemp(3)
  • Randomness added to the TCP ISS value for protection against spoofing attacks. !
  • random padding in IPsec esp_old packets.
  • To generate salts for the various password algorithms.
  • For generating fake S/Key challenges.
  • In photurisd *************** *** 216,222 ****